Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-07Nozomi NetworksNozomi Networks Labs
Threat Intelligence: Analysis of the SBIDIOT IoT Malware
SBIDIOT
2021-04-07ANALYST1Jon DiMaggio
Ransom Mafia - Analysis of the World's First Ransomware Cartel
Conti Egregor LockBit Maze RagnarLocker SunCrypt VIKING SPIDER
2021-04-07ANALYST1Jon DiMaggio
Ransom Mafia Analysis of the World's First Ransomware Cartel
Conti Egregor LockBit Maze RagnarLocker Ryuk SunCrypt TA2101 VIKING SPIDER
2021-04-06LexfoLexfo
Dridex Loader Analysis
Dridex
2021-04-06McAfeeAlexandre Mundo, Thibault Seret, Thomas Roccia
Technical Analysis of Cuba Ransomware
Cuba
2021-04-05Huntress LabsJohn Hammond
From PowerShell to Payload: An Analysis of Weaponized Malware
2021-04-054rchibld4rchibld
CruLoader Analysis
2021-04-01AhnLabASEC Analysis Team
ASEC REPORT VOL.102 Q1 2021
ComeBacker JessieConTea LCPDot
2021-04-01humansecurityAdam Sell, Federico Harrington, Gabi Cirlig, Inna Vasilyeva, Michael McNally, Michael Moran, Mikhail Venkov, Vikas Parthasarathy
PARETO: A Technical Analysis
2021-03-31GoogleAdam Weidemann, Google Threat Analysis Group
Update on campaign targeting security researchers
2021-03-31Stratosphere LabKamila Babayeva, Sebastian García
Dissecting a RAT. Analysis of the AndroRAT
AndroRAT
2021-03-31InfoSec Handlers Diary BlogXavier Mertens
Quick Analysis of a Modular InfoStealer
Amadey
2021-03-30YouTube ( malware-traffic-analysis.net)Brad Duncan
2021-03-29 BazaCall (BazarCall) Example
BazarBackdoor
2021-03-29VMWare Carbon BlackGiovanni Vigna, Jason Zhang, Oleg Boyarchuk
Dridex Reloaded: Analysis of a New Dridex Campaign
Dridex
2021-03-27InfoSec Handlers Diary BlogGuy Bruneau
Malware Analysis with elastic-agent and Microsoft Sandbox
2021-03-25LIFARSLIFARS
DearCry Ransomware Malware Analysis and Reverse Engineering
dearcry
2021-03-25VMWare Carbon BlackBaibhav Singh, Giovanni Vigna, Threat Analysis Unit
Memory Forensics for Virtualized Hosts
2021-03-24GoggleHeadedHacker BlogJacob Pimental
Anti-Analysis Techniques Used in Excel 4.0 Macros
2021-03-22AhnLabAhnLab ASEC Analysis Team
대북관련 본문 내용의 External 링크를 이용한 악성 워드 문서
2021-03-21Twitter (@CyberRaiju)Jai Minton
Twitter Thread with analysis of .NET China Chopper
CHINACHOPPER